| Index: net/cookies/canonical_cookie.cc
 | 
| diff --git a/net/cookies/canonical_cookie.cc b/net/cookies/canonical_cookie.cc
 | 
| index de2fbbe6c65f03826722b05646936e95ad0ae536..2b53e4ee497fa4ed7e3fa6652afd0e8221e53b16 100644
 | 
| --- a/net/cookies/canonical_cookie.cc
 | 
| +++ b/net/cookies/canonical_cookie.cc
 | 
| @@ -195,8 +195,7 @@ std::unique_ptr<CanonicalCookie> CanonicalCookie::Create(
 | 
|    // origins", if the cookie's "secure-only-flag" is "true" and the requesting
 | 
|    // URL does not have a secure scheme, the cookie should be thrown away.
 | 
|    // https://tools.ietf.org/html/draft-ietf-httpbis-cookie-alone
 | 
| -  if (options.enforce_strict_secure() && parsed_cookie.IsSecure() &&
 | 
| -      !url.SchemeIsCryptographic()) {
 | 
| +  if (parsed_cookie.IsSecure() && !url.SchemeIsCryptographic()) {
 | 
|      VLOG(kVlogSetCookies)
 | 
|          << "Create() is trying to create a secure cookie from an insecure URL";
 | 
|      return nullptr;
 | 
| @@ -240,7 +239,6 @@ std::unique_ptr<CanonicalCookie> CanonicalCookie::Create(
 | 
|      bool secure,
 | 
|      bool http_only,
 | 
|      CookieSameSite same_site,
 | 
| -    bool enforce_strict_secure,
 | 
|      CookiePriority priority) {
 | 
|    // Expect valid attribute tokens and values, as defined by the ParsedCookie
 | 
|    // logic, otherwise don't create the cookie.
 | 
| @@ -260,7 +258,7 @@ std::unique_ptr<CanonicalCookie> CanonicalCookie::Create(
 | 
|      return nullptr;
 | 
|    }
 | 
|  
 | 
| -  if (enforce_strict_secure && secure && !url.SchemeIsCryptographic())
 | 
| +  if (secure && !url.SchemeIsCryptographic())
 | 
|      return nullptr;
 | 
|  
 | 
|    std::string parsed_path = ParsedCookie::ParseValueString(path);
 | 
| 
 |